A flaw was found in the QEMU built-in VNC server while processing ClientCutText messages. The qemuclipboardrequest() function can be reached before vncservercuttextcaps() was called and had the chance to initialize the clipboard peer, leading to a NULL pointer dereference. This could allow a malicious authenticated VNC client to crash QEMU and trigger a denial of service.
{
"cwe_ids": [
"CWE-476"
],
"cna_assigner": "redhat",
"osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/6xxx/CVE-2023-6683.json"
}